Avaya Surge™ Solution Makes Securing the IoT Easy for All Devices
Let’s explore how you can manage thousands of IoT devices while protecting your network and data from unnecessary risk. Often, we think newer devices will be more secure than older ones that were network-enabled before the current threat profile. However, Gartner predicts devices will remain unsecured for quite some time. The Avaya Surge™ Solution makes securing the IoT easy for all devices.
Avaya Surge, recently named a 2017 Gold Edison Award winner, consists of an IoT controller and an Open Networking Adapter, which is a proxy for IoT endpoints and provides the programmable security for insecure devices.
Key Attributes of Avaya Surge
- Automated onboarding of IoT devices
- Inventory reporting, including real-time status
- MAC-based device security
- Traffic flow filtering
- Tight integration with Avaya SDN Fx (but works with any IP network)
- IPSec encryption and tunneling in release 2.0 (coming in the second half of 2017)
How Avaya Surge Works
- An Open Networking Adapter is paired with an IoT device on the IoT controller by matching the serial number of Adapter (or QR code) to the MAC address of the IoT device. The IoT Controller sees the Adapter/IoT device as an inseparable pair and manages the IoT device through the Adapter.
- The IoT device is connected to the Adapter which is connected to the edge switch (plug RJ45 connectors together).
- The Adapter uses DHCP and DNS to locate the IoT Controller. The Adapter negotiates security keys with the IoT Controller and the onboarding process begins.
- The IoT Controller looks up the profile identified for the device type connected to the Adapter and down loads it to the Adapter. The profile contains network configuration, service requirements and allowable flows.
- The IoT device establishes connection to its application server and the Adapter begins monitoring network traffic.
Key Operational Benefits of Avaya Surge
- The Adapter doesn’t retain profile information through a power cycle. If an Adapter is disconnected from the network or loses power, data in memory is lost. When power is returned, the Adapter must connect to the IoT controller to get its profile to function. Avaya Surge will indicate the Adapter/IoT device has lost network connectivity. Without a valid registration, the Adapter does nothing. Network or profile information can’t be learned from a stolen Adapter.
- The Adapter is based on white list security. When the Adapter boots, it doesn’t allow traffic from the IoT device. The profile provides a white list of approved devices and flows. For instance, if the only IP addresses that an IoT device is supposed to contact are its application server and network services (DHCP, DNS, etc.), the Adapter will block all other traffic. This prevents a compromised device from infecting its peers.
- The Adapter has a learning mode. A profile can be complex to create. Therefore, the Adapter can be set to accept all traffic and mirror it to the IoT controller. The IoT device operates normally with Avaya Surge cataloging the traffic. This allows the IoT device to operate normally under the supervision of IT staff. When adequate time has passed (dependent on device operation), the captured traffic is converted to a reusable profile that becomes the standard for all like devices. The Adapter is taken out of learning mode, updated with the new profile, and a new device has been added to the network—safely and sanely. Under normal circumstances, the IoT Controller receives reports only from the Adapter and isn’t in the data path.
- The profile stops MAC spoofing. If all the Adapter did was lock down a MAC address, an antagonist could disconnect the IoT device and connect a computer with the same MAC address. Technically, the Adapter will allow this to happen. However, as soon at the antagonist tries to do something that the IoT device isn’t normally allowed to do, the Adapter will block the traffic and report an abnormal flow attempt to the IoT Controller. One of the issues with IoT is many devices can’t be physically secured and are susceptible to tampering. Avaya Surge addresses this challenge.
- The inventory addresses all use cases. IoT devices will be deployed within an organization across many use cases and application stacks. For example, a facility may have point-of-sale terminals: CCTV cameras, HVAC sensors and controls, security key pads and door controllers, medical devices, robots, assembly stations, and more. Each of these is deployed with its own application servers with device status monitoring and inventory management. Avaya Surge provides network IT with a single pane status for all IoT devices that are secured with Adapters within the infrastructure.
- Avaya Surge supports device mobility. Devices can be automatically moved from one network port to another. The Adapter contains OVS 2.4 code, including support for Auto-attach (IEEE 802.1Qcj). Auto-attach provides the ability for the Adapter to signal Avaya Fabric Attach to create the required services on the edge switch, such as VLAN and ISID mapping. If a device needs to be moved, a technician would simply unplug the Adapter from the switch, move the device and Adapter to the new location, and plug the Adapter into the new port. When the Adapter is unplugged, the Adapter loses its profile and the SDN Fx network disables the services to the old port. When the Adapter is reconnected, it contacts the IoT Controller to get its profile and the OVS requests the services be provisioned on the new port. Within a couple of minutes, the IoT device is functioning in its new location and the move has been done safely, sanely and without Networking IT involved. Note that networking IT would have been notified when the Adapter was disconnected and reconnected through the Avaya Surge dashboard.
In my recent blogs about the IoT, I’ve looked at how the IoT enables Digital Transformation and examined a business-first approach to IoT technology adoption. Then I looked at how Avaya’s SDN FxTM provides a foundation for a safe and sane IoT deployment. Next in this blog series, I’ll explore deploying Avaya Surge in a non-SDN Fx IP network.